Okta is an identity and access management service for web-based applications.
Use Okta to Trigger Torq workflows
To ingest Okta events in Torq, you need to create an Okta trigger integration and use the generated webhook URL (Torq endpoint) to configure an event hook in Okta.
Configure an Okta Trigger Integration
Go to Build > Integrations > Triggers > Okta and click Add.
Type a meaningful name for the integration. This cannot be changed later.
Optionally add an authentication header name and value (field and secret).
Click Add.
Copy the webhook URL (Torq endpoint).
While it is optional to provide an authentication header name and value, it's recommended for security purposes. The authentication header name and value must be identical in Torq and Okta. For example, the name auth
and the value abc123
.
Configure Okta to Send Events to Torq
In Okta, you must create an event hook, select the events to subscribe to (which events to send to Torq) and enter the webhook you generated when you created the Okta integration in Torq. When getting started, we recommend using a single Okta event hook to send all events to Torq and apply trigger conditions to focus the workflow events on the Torq side (see example in the test workflow).
Go to Workflow > Event Hooks and click Create Event Hook.
In the Name field, enter a meaningful name for the event hook, such as
Torq Events
.In the URL field, enter the webhook for the Okta integration in Torq.
Enter the authentication field and authentication secret according to the authentication name and value of the integration in Torq. In this example,
auth
andabc123
.From the Subscribe to events drop-down menu, select one or more events to send to Torq (the User reported suspicious activity event is used in the test workflow below).
Click Save & Continue.
Use Okta Steps in a Torq Workflow
To use Okta steps in Torq workflows, you must create an Okta steps integration, which requires an Okta API token and your Okta domain.
Create an Okta API Token
API tokens inherit the same permissions as the user who creates them, and if the user permissions change, the API token permissions also change. For more information about API tokens, see the Okta documentation.
Sign in to your Okta account with administrator privileges.
Click Security > API > Tokens > Create Token.
Enter a meaningful name for the token, such as Torq Toke, and click Create Token.
Copy the API token to enter it when creating the Okta integration in Torq.
Click the Authorization Servers tab and copy your Issuer URI to enter it when creating the Okta integration in Torq.
Create an Okta Steps Integration in Torq
Go to Build > Integrations > Steps > Okta and click Add.
Type a meaningful name for the integration instance. This cannot change later.
Enter the values for the following fields. You copied and saved these in the previous task.
API Key
Okta Domain
Click Add.
Available Steps
These are the premade steps for OpenAI. Don't see the step you need? No problem; you can easily create a custom step.
Activate users
Add a user to a group
Assign a role to a user
Assign a user to an app
Close a session
Create a group
Create a user without credentials
Deactivate a user
Delete all sessions for a user
Delete a user
Enroll Google Authenticator factor
Enroll Okta email factor
Get group users
Get session details
Get a single group
Get a user by email
Get a user by ID
Get user groups
List apps
List app users
List groups
List system logs
List user-assigned roles
List user auth factors
List users
Reactivate a user
Remove a group
Remove a user from an app
Remove a user from a group
Reset auth factors
Reset a user password
Suspend a user
Unassign a role from a user
Unsuspend a user